Think again, grasshopper. You have two games, A and B, and in each game you have Opponent A and Opponent B.

Melih's premise is based around Opponent A in game A making the opening move. Melih would then replicate this as the opening move in game B. Opponent B would then make his move in game B. Melih would replicate this move in game A as "his" response to Opponents A's opening move. He is then acting as the man in the middle and each of the opponents are, in effect, playing each other, using the man in the middle as a proxy.

If the move order is any different, Melih's premise fails.

Ewen :-)

Logged

As your mums would say, "If you can't play nice with all the other kiddies, go home".All users are asked to please read and abide by the Comodo Forum Policy.If you can't conform, don't use the forum.

Wonder if there could be a Comodo Response Team that could be put in place, along with a Commercial Package that would include more thorough inspections and questioning, to ensure new Threats are discovered and eliminated as close to Instantly as possible but not months later.

Hi Melih, I've heard enough trash talk to last me for awhile, a considerable amount of the folks that miss the memory firewall as well as BOClean as stand alone.. surely there has to be a spot to reinsert them?

turnorburn

Logged

Psalm 16:11 Thou wilt shew me the path of life: in thy presence is fulness of joy; at thy right hand there are pleasures for evermore.

Hi Melih, I've heard enough trash talk to last me for awhile, a considerable amount of the folks that miss the memory firewall as well as BOClean as stand alone.. surely there has to be a spot to reinsert them?

turnorburn

at the moment we don't have any plans to introduce either as a standalone i am afraid. Both are in CIS.

From beginning, I want to emphasize that no one could better as Melih explain thedirection in which computers protection will go. I think there is no product inthis world to protect against Zero Day attacks, but the important thing is thedirection which the Internet Security Products is going to reach this ideal andI think Comodo Internet Security is one of them (actually am sure now ).

What I say is of my own experiences after an extensive testing of many productsbased on classic AV (based on detection). I can say that in the last 6-7 yearsfrom all products tested by me (bitdefender, avast, avira, zone alarms, pctools,avg, mcafee, symantec and kaspersky) no one could provide me "peace", what tosay about a kind of "warranty" of protection against new malwares appeared onthe market. For conventional products based on detection, what matters is ora good basis with signatures (which could mean many infected computers),or a good infrastructure to detect new malwares so that the product be beston the market. But I think this is not enough to present day. The only productthat impressed me was Kaspersky, but unfortunately not convinced me. Therefore,in the past three years I started using Comodo as impressed by defense+ module(HIPS technology) and I realized that this is the right direction of computerprotection, but something was missing. The missing thing was completed nowwith whitelist and the sandbox. This was the first thing that made me believeI found the product wich I'm looking for.Most products have these modules into their component: Detection / Cleaningand Prevention. The most classic AV are based on Detections and Cleaning butbut not so much on Prevention. What they offer in terms of prevention donot cover the full range of new malwares on the market. The second thingwich convinced me that I found the product wich I'm looking for is howthe three modules are used:

1. Prevention2. Detection3. Cleaning

I am aware that this technology is under development, but what matters isthat I found the product which can lead in the Future of Computer Security.

I can not conclude without trying to answer the question: Is Comodo InternetSecurity the way to Protection against Zero Day Attacks? I think YES and ifnot yet, I'm sure is the right direction!

A HIPS program is not the panacea.People (I include me myself) will be tired of answering questions and then the HIPS fails...I really can trust myself taking all the decisions of what is clean and what is infected in my computer. I trust in serious security companies.Zero day attacks need a special attention: heuristic, generic signatures, algorithm detection... Some things you can achieve with a good security suite (or a set of standalone programs).